Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
submitted
30-07-2022 03:45
Behavioral task
behavioral1
Sample
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe
-
Size
1.9MB
-
MD5
6a235ccfd5dd5e47d299f664d03652b7
-
SHA1
75825ab1b4db3c5e41a17c98394c46d02f766b5a
-
SHA256
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786
-
SHA512
3abbfcbf43daf58c7a8b3a148f251fdf09acea63418481e6a6d7562a4d7bb2dace784aec5839f55737cff0ca83e6c457546a1d49ae361af8e20fea14391b79f8
-
SSDEEP
49152:woSsL+Ax4UH/9LEnzjMdtCd1U9zfb/niBBk+QqX0NmXqxRx:/Iu/mnzwA1U9X/niB3Xg
Malware Config
Extracted
Family
ffdroider
C2
http://152.32.228.19
Signatures
-
FFDroider payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4656-130-0x0000000000300000-0x00000000007B7000-memory.dmp family_ffdroider behavioral2/memory/4656-131-0x0000000000300000-0x00000000007B7000-memory.dmp family_ffdroider behavioral2/memory/4656-132-0x0000000000300000-0x00000000007B7000-memory.dmp family_ffdroider behavioral2/memory/4656-133-0x0000000000300000-0x00000000007B7000-memory.dmp family_ffdroider behavioral2/memory/4656-1012-0x0000000000300000-0x00000000007B7000-memory.dmp family_ffdroider behavioral2/memory/4656-1013-0x0000000000300000-0x00000000007B7000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exedescription pid process Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe Token: SeManageVolumePrivilege 4656 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe